Overlay (and P2P) Networks

Similar documents
Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Graph Mining Techniques for Social Media Analysis

Graphs over Time Densification Laws, Shrinking Diameters and Possible Explanations

Graph models for the Web and the Internet. Elias Koutsoupias University of Athens and UCLA. Crete, July 2003

Some questions... Graphs

Dmitri Krioukov CAIDA/UCSD

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies

IC05 Introduction on Networks &Visualization Nov

Self similarity of complex networks & hidden metric spaces

School of Computer Science Carnegie Mellon Graph Mining, self-similarity and power laws

Broadband Networks. Prof. Karandikar. Department of Electrical Engineering. Indian Institute of Technology, Bombay. Lecture - 26

The Shape of the Network. The Shape of the Internet. Why study topology? Internet topologies. Early work. More on topologies..

Towards Modelling The Internet Topology The Interactive Growth Model

Graph Mining and Social Network Analysis

An Alternative Web Search Strategy? Abstract

Small-World Characteristics of Internet Topologies and Implications on Multicast Scaling

Network Theory: 80/20 Rule and Small Worlds Theory

Introduction to Networks and Business Intelligence

USING SPECTRAL RADIUS RATIO FOR NODE DEGREE TO ANALYZE THE EVOLUTION OF SCALE- FREE NETWORKS AND SMALL-WORLD NETWORKS

Research Article A Comparison of Online Social Networks and Real-Life Social Networks: A Study of Sina Microblogging

Analyzing and modelling the AS-level Internet topology

Some Examples of Network Measurements

Lecture 8: Routing I Distance-vector Algorithms. CSE 123: Computer Networks Stefan Savage

Visualization and Modeling of Structural Features of a Large Organizational Network

Chapter 29 Scale-Free Network Topologies with Clustering Similar to Online Social Networks

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

UDP PING: a dedicated tool for improving measurements of the Internet topology

Definition. A Historical Example

Chapter 10 Link-State Routing Protocols

Mining Network Relationships in the Internet of Things

On the effect of forwarding table size on SDN network utilization

Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems

1 Six Degrees of Separation

Temporal Dynamics of Scale-Free Networks

Zipf s law and the Internet

How Placing Limitations on the Size of Personal Networks Changes the Structural Properties of Complex Networks

Network Load Balancing Using Ant Colony Optimization

Understanding the evolution dynamics of internet topology

Course Syllabus. BIA658 Social Network Analytics Fall, 2013

Friendship selection in the Social Internet of Things: challenges and possible strategies

Maximizing Restorable Throughput in MPLS Networks

Analysis of Internet Topologies: A Historical View

General Network Analysis: Graph-theoretic. COMP572 Fall 2009

Network Tomography and Internet Traffic Matrices

Social Media Mining. Network Measures

Network-Wide Capacity Planning with Route Analytics

Analysis of Internet Topologies

Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats

Sampling Biases in IP Topology Measurements

Six Degrees: The Science of a Connected Age. Duncan Watts Columbia University

Inet-3.0: Internet Topology Generator

Effects of node buffer and capacity on network traffic

Information Network or Social Network? The Structure of the Twitter Follow Graph

Efficient target control of complex networks based on preferential matching

Characterizing and Modelling Clustering Features in AS-Level Internet Topology

On the Impact of Route Monitor Selection

The Quality of Internet Service: AT&T s Global IP Network Performance Measurements

Anonymous Communication in Peer-to-Peer Networks for Providing more Privacy and Security

The average distances in random graphs with given expected degrees

The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet

Degrees of Separation in the New Zealand Workforce: Evidence from linked employer-employee data

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

PUBLIC TRANSPORT SYSTEMS IN POLAND: FROM BIAŁYSTOK TO ZIELONA GÓRA BY BUS AND TRAM USING UNIVERSAL STATISTICS OF COMPLEX NETWORKS

CS268 Exam Solutions. 1) End-to-End (20 pts)

An Efficient Fault Tolerance Model for Path Recovery in MPLS Networks

Extracting Information from Social Networks

Comparing Trade-off Based Models of the Internet

Degrees of Separation in Social Networks

corresponds to the case of two independent corresponds to the fully interdependent case.

Lecture 2.1 : The Distributed Bellman-Ford Algorithm. Lecture 2.2 : The Destination Sequenced Distance Vector (DSDV) protocol

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

Random graphs and complex networks

Exterior Gateway Protocols (BGP)

1. Write the number of the left-hand item next to the item on the right that corresponds to it.

Limitations of Packet Measurement

Graph Processing and Social Networks

High-Frequency Active Internet Topology Mapping

Modeling of Corporate Network Performance and Smoothing Spline Interpolation

Efficient Doubletree: An Algorithm for Large-Scale Topology Discovery

Social Networks and Social Media

Complex Networks Analysis: Clustering Methods

Internet Control Message Protocol (ICMP)

Evolution of the Internet AS-Level Ecosystem

Automatically Selecting a Close Mirror Based on Network Topology

On the Placement of Management and Control Functionality in Software Defined Networks

Enhanced Multiple Routing Configurations For Fast IP Network Recovery From Multiple Failures

Structural constraints in complex networks

EVOLVING ENTERPRISE NETWORKS WITH SPB-M APPLICATION NOTE

ModelingandSimulationofthe OpenSourceSoftware Community

SuperViz: An Interactive Visualization of Super-Peer P2P Network

Project Report on Traffic Engineering and QoS with MPLS and its applications

IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks

Distributed Computing over Communication Networks: Topology. (with an excursion to P2P)

Strategies for Optimizing Public Train Transport Networks in China: Under a Viewpoint of Complex Networks

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

Link-State Routing Protocols

Six Degrees of Separation in Online Society

Statistical theory of Internet exploration

Are You Moved by Your Social Network Application?

Transcription:

Networks Part II Samu Varjonen Ashwin Rao

Models of Complex Networks to Model Overlay Networks Milgram's Experiment Duncan Watts Random Rewiring Model Scale Free Networks (Power-Law Networks) Preferential attachment Evolving Copying Model (Copying Generative Model) Navigation in Small World Complex Networks Overlay Networks P2P

Outline for this lecture Error and Attack Tolerance of Complex Networks Navigation in Complex Networks Mathematics and the Internet: A Source of Enormous Confusion and Great Potential Summary on Modeling Overlay Networks

Scale-Free Model for AS-Graph High Degree Nodes (Hubs) AS Topology of skitter dataset parsed by SNAP team http://snap.stanford.edu/data/as-skitter.html

Importance of Hubs (Random Graph) Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no. 6794 (2000): 378-382.

Error vs Attack Error (Node Failure) random node fails (malfunction) Attack Selected node with a given property is made to fail Which nodes would you target if you knew the network is a scale-free network? Nodes with the highest degree

Impact of Errors and Attacks (Graph Diameter) Graph Diameter Fraction of nodes removed Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no. 6794 (2000): 378-382.

Impact of Errors and Attacks (Size of Largest Cluster) S: Fraction of nodes in largest cluster <s>: average size of isolated clusters Relative <s> and S Fraction of nodes removed Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no. 6794 (2000): 378-382.

Network Response to Attacks and Failures f=0 f 0.05 f 0.18 f 0.45 f=1 Albert, Réka, et al. "Error and attack tolerance of complex networks." nature 406, no. 6794 (2000): 378-382.

Critical Threshold (random node failures) m=1 Cohen's technique can be extended to errors (No closed form for for errors ) Cohen, Reuven et al. "Resilience of the Internet to random breakdowns." Physical review letters 85, no. 21 (2000): 4626.

Summary on Attack and Error Tolerance of Complex Networks Scale-free networks resilient to random failures but vulnerable to targetted attacks

Clustering of Nodes Constant clustering coeff. Average Degree Increases How to Generate Scale-Free Graphs with Strong Clustering Serrano, M. Angeles, Dmitri Krioukov, and Marián Boguná. "Self-similarity of complex networks and hidden metric spaces." Physical review letters 100, no. 7 (2008): 078701.

Generating Scale-Free Graphs with Strong Clustering

Path Length (Greedy Routing) Avg. Length of Greedy Routing Paths Network Size Exponent Path length grows polylogarithmically with the network size Paths shorter for smaller exponents and stronger clustering Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009): 74-80.

Greedy Routing Hidden Space as the coordinate space Hidden space is circle in this example Greedy Routing: Send to neighbor who is closer to the destination (in hidden space) Unsuccessful Paths: None of your neighbors are closer to the destination in the hidden space

P(success) decays with N Success Probability (Greedy Routing) Weak clustering Strong clustering P(success) intertwined Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009): 74-80.

Navigation in Scale Free Networks PGP BGP

Implications of Result Internet Routing Routers currently exchange signals to keep cohenrent view of network Network size increasing with time Hidden metric space eliminates the need for control signals exchanged to notify changes in network How to proceed to discover the hidden metric space Does Shortest Path imply Shortest Time to destination? What happens in case of congestion at hubs?

Scale-Free Model for AS-Graph AS Topology of skitter dataset parsed by SNAP team http://snap.stanford.edu/data/as-skitter.html

Is the Scale-Free Internet A Myth? What we have seen till now wrt to Preferential Attachment Preferential attachment results in Hubs Hubs vulnerable to coordinated attacks Why is the Internet still up and running Is the Scale-Free modeling paradigm consistent with the engineered nature of the Internet and the design constraints imposed by existing technology? Is the simplistic toy model too generic? Do the available measurements, their analysis, and their modeling efforts support the claims made by Error and Attack Tolerance paper?

Importance of Measurements Tool for measurement study for AS-measurements Traceroute Biases of traceroute Uses IPv4 Protocol What about non-ipv4 protocols like MPLS? Entry points to non-ipv4 regions can aggregate to Hubs Only reports the interfaces traversed by the packet Routers can have multiple interfaces and appear on different routes with different IP addresses

Leverage Domain Knowledge Device Constraints Finite number of interfaces on routers Finite capacity of routers Placement of High Degree Nodes What about Overlay Networks? Edge vs Core How would you deploy the network if you are a network engineer? Leverage domain knowledge to identify driving forces behind the design of high engineered systems such as the Internet

Scale Free for Gnutella? Gnutella August 2002 dataset parsed by SNAP team http://snap.stanford.edu/data/p2p-gnutella31.html

Recap of Modeling Overlay Networks Milgram's Experiment Duncan Watts Random Rewiring Model Scale-Free Networks Preferential attachment Evolving Copying Model (Copying Generative Model) Scale-Free with Strong Clustering Error and Fault Tolerance of Complex Networks Navigation (Greedy Routing) In Small World (Kleinberg's Small World) In Complex Networks (Scale-Free with Strong Clustering) Mathematics and the Internet: A Source of Enormous Confusion and Great Potential

Commonly used metrics Clustering Coefficient Diameter Degree Distribution

Methodology 1) Make observations (conduct measurement studies) 2)Build model to explain observations Choose the right level of granularity (zoom level) Strip the problem to a simple form Attempt to formulate the problem and model the system 3)Validate model Reproduce observations/measurements Explain observations 4)Revisit step 2 (and 1) to improve understanding

Important Articles Milgram, Stanley. "The small world problem." Psychology today 2.1 (1967): 60-67 Watts, Duncan and Strogatz, Steven. "Collective dynamics of small-world networks." Nature 393.6684 (1998): 440-442. Barabási, Albert-László, and Albert, Réka. "Emergence of scaling in random networks." Science 286, no. 5439 (1999): 509-512. Kleinberg, Jon. "The small-world phenomenon: An algorithmic perspective." In ACM Symposium on Theory of computing, pp. 163-170. 2000. Ravi Kumar et al. "Stochastic models for the web graph." In Annual Symposium on Foundations of Computer Science, 2000. Albert, Réka, and Barabási, Albert-László. "Statistical mechanics of complex networks." Reviews of modern physics 74.1 (2002): 47. Newman, Mark. "The structure and function of complex networks." SIAM review 45, no. 2 (2003): 167-256. Mitzenmacher, M. (2004). "A brief history of generative models for power law and lognormal distributions." Internet mathematics, 1(2), 226-251. Mark Newman. "Power laws, Pareto distributions and Zipf's law." Contemporary physics 46, no. 5 (2005): 323-351 Jure Leskovec et al. "Graphs over time: densification laws, shrinking diameters and possible explanations." In ACM SIGKDD, pp. 177-187. 2005. Boguna, Marian et al. "Navigability of complex networks." Nature Physics 5, no. 1 (2009): 74-80. W Willinger et al. Mathematics and the internet: A source of enormous confusion and great potential. In Notices of the AMS. 2009.

Sources for these slides Sasu Tarkoma Overlay and P2P Networks, 2015 Datasets from Stanford Network Analysis Project (SNAP)